l3lackcurtains / Optical-Character-Recognition-using-CNN-KNN-SVM-RFView external linksLinks
Handwriting detection using CNN, KNN, SVM, and Random Forest algorithms.
☆18Nov 24, 2017Updated 8 years ago
Alternatives and similar repositories for Optical-Character-Recognition-using-CNN-KNN-SVM-RF
Users that are interested in Optical-Character-Recognition-using-CNN-KNN-SVM-RF are comparing it to the libraries listed below
Sorting:
- SQL Server Always Encrypted Key Store Generic Provider for Key Store Interopearibility between Windows and Linux☆11Oct 24, 2018Updated 7 years ago
- ☆13Apr 22, 2024Updated last year
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- Infinite Cloud bot source code☆14May 10, 2025Updated 9 months ago
- Stacked five machine learning models: SVM, DT, RF, NB, and KNN, into one “smart detection stacked model” using a stacking classifier to …☆11Aug 9, 2022Updated 3 years ago
- ☆11Oct 1, 2025Updated 4 months ago
- AEAD encryption using Trusted Platform Module (TPM)☆12Jan 5, 2026Updated last month
- A high-performance, thread-safe channel implementation in C++17, inspired by Go's channels☆16Jul 28, 2024Updated last year
- Solutions to math olympiad problems in Isabelle/HOL☆11May 29, 2021Updated 4 years ago
- CloudedBats.org - main repository☆10Mar 19, 2022Updated 3 years ago
- DSP filter experiments on the STM32F746, CW audio filter☆13Apr 24, 2017Updated 8 years ago
- Paribasa or you can call it as Javanese quotes☆10Jan 6, 2023Updated 3 years ago
- STM32F10x_DSP_Lib☆10Mar 12, 2015Updated 10 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Updated this week
- OCR using a simple network developed from scratch on NIST36 dataset vs with CNN on PyTorch on EMNIST dataset☆12Jan 29, 2019Updated 7 years ago
- ☆10Jun 13, 2017Updated 8 years ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆13Oct 6, 2024Updated last year
- Application Layer DDoS attack detection using fast entropy computation method☆13May 18, 2024Updated last year
- Trusted side of the TEE☆13Feb 6, 2026Updated last week
- Machine Learning Based DDoS Detection (HTTP,UDP,TCP and ICMP Flood Attack)☆10Jul 3, 2018Updated 7 years ago
- ☆11Mar 20, 2017Updated 8 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Jan 26, 2026Updated 3 weeks ago
- Loadable Module for Keystone Enclave☆19Sep 24, 2022Updated 3 years ago
- Arduino Library to use Cbor encoder and several examples to use☆10Oct 23, 2015Updated 10 years ago
- Experiment code☆10Sep 17, 2018Updated 7 years ago
- A TEE programming framework based on trusted functions.☆14Mar 23, 2021Updated 4 years ago
- PRINCESS source code☆11Oct 15, 2016Updated 9 years ago
- The wrapper over asmcgocall to call C functions synchronously, without extra os threads and overhead on it. Probably won't work since 1.1…☆15Feb 20, 2020Updated 5 years ago
- Porpoise is a tool to port applications to Intel SGX enclaves.☆10Sep 27, 2021Updated 4 years ago
- 🌊 A React UI library☆13Feb 2, 2022Updated 4 years ago
- Repository to discuss and track progress of "Future of Build Toolchain" Strategic Initiative☆11Feb 2, 2022Updated 4 years ago
- Container building stuff☆15Nov 7, 2025Updated 3 months ago
- GO implementation of FF1 and FF3 from NIST Special Publication 800-38G☆14Jan 4, 2018Updated 8 years ago
- Create & store backups in telegram infinite storage☆12Oct 3, 2025Updated 4 months ago
- OCaml implementation of Wake-On-LAN (WOL)☆16Apr 30, 2024Updated last year
- Shamir's secret sharing algorithm for react-native☆18Jun 24, 2024Updated last year
- Keystone security monitor library for opensbi (Discountinued after monorepo-izing)☆13Oct 28, 2022Updated 3 years ago
- Dockerized FPGA toolchains containing openxc7, f4pga, vivado and more☆14Apr 3, 2025Updated 10 months ago
- Evaluates Twitter accounts to determine whether they're bots☆16May 20, 2019Updated 6 years ago